Author:
Anderson Blake,Quist Daniel,Neil Joshua,Storlie Curtis,Lane Terran
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Computer Science (miscellaneous)
Reference39 articles.
1. Aspack software. http://www.aspack.com/asprotect.html , Accessed 5 August 2010
2. Bach, F.R., Lanckriet, G.R.G., Jordan, M.I.: Multiple kernel learning, conic duality, and the smo algorithm. In: Proceedings of the Twenty-First International Conference on Machine Learning, ICML’04, p. 6. ACM, New York (2004)
3. Ben-Hur, A.: Pyml: machine learning in python. http://pyml.sourceforge.net/ , Accessed 28 July 2010
4. Bishop C.M.: Pattern Recognition and Machine Learning (Information Science and Statistics). Springer, New York (2006)
5. Bruschi, D., Martignoni, L., Monga, M.: Detecting self-mutating malware using control-flow graph matching. In: Bschkes, R., Laskov, P. (eds.) Detection of Intrusions and Malware and Vulnerability Assessment. Lecture Notes in Computer Science, vol. 4064, pp. 129–143. Springer, Berlin (2006)
Cited by
189 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献